Skip to main content

Home/ Ad4dcss/Digital Citizenship/ Group items tagged or

Rss Feed Group items tagged

Anne Bubnic

Bullying Policy at Hudson Area School District - 0 views

  • Bullying or other aggressive behavior toward a student, whether by other students, staff, or third parties, including Board members, parents, guests, contractors, vendors, and volunteers, is strictly prohibited. This prohibition includes physical, verbal, and psychological abuse, including hazing, gestures, comments, threats, or actions to a student, which cause or threaten to cause bodily harm, reasonable fear for personal safety or personal degradation. Demonstration of appropriate behavior, treating others with civility and respect, and refusing to tolerate harassment or bullying is expected of administrators, faculty, staff, and volunteers to provide positive examples for student behavior. This policy applies to all activities in the District, including activities on school property, in a school vehicle, and those occurring off school property if the student or employee is at any school-sponsored, school-approved or school-related activity or function, such as field trips or athletic events where students are under the school’s control, or where an employee is engaged in school business. Misconduct occurring outside of school may also be disciplined if it interferes with the school environment. "Bullying" is any gesture or written, verbal, graphic, or physical act (including electronically transmitted acts – i.e. internet, telephone or cell phone, personal digital assistant (PDA), or wireless hand held device) that is reasonably perceived as being motivated either by any actual or perceived characteristic, such as race, color, religion, ancestry, national origin, gender, sexual orientation, gender identity and expression or a mental, physical, or sensory disability or impairment; or by any other distinguishing characteristic. Such behavior is considered harassment or bullying whether it takes place on or off school property, at any school-sponsored function, or in a school vehicle.
  •  
    Includes a clause for cyberbullying.
Anne Bubnic

Protecting Your Online Identity and Reputation - 0 views

  • Remember that nothing is temporary online. The virtual world is full of opportunities to interact and share with people around the world. It's also a place where nothing is temporary and there are no "take-backs." A lot of what you do and say online can be retrieved online even if you delete it — and it's a breeze for others to copy, save, and forward your information.
  • Mark your profiles as private. Anyone who accesses your profile on a social networking site can copy or screen-capture information and photos that you may not want the world to see. Don't rely on the site's default settings. Read each site's instructions or guidelines to make sure you're doing everything you can to keep your material private.
  • Safeguard your passwords and change them frequently. If someone logs on to a site and pretends to be you, they can trash your identity. Pick passwords that no one will guess (don't use your favorite band or your dog's birthday; try thinking of two utterly random nouns and mixing in a random number), and change them often. Never share them with anyone other than your parents or a trusted adult. Not even your best friend, boyfriend, or girlfriend should know your private passwords!
  • ...6 more annotations...
  • Don't post inappropriate or sexually provocative pictures or comments. Things that seem funny or cool to you right now might not seem so cool years from now — or when a teacher, admissions officer, or potential employer sees them. A good rule of thumb is: if you'd feel weird if your grandmother, coach, or best friend's parents saw it, it's probably not a good thing to post. Even if it's on a private page, it could be hacked or copied and forwarded.
  • Don't respond to inappropriate requests. Research shows that a high percentage of teens receive inappropriate messages and solicitations when they're online. These can be scary, strange, and even embarrassing. If you feel harassed by a stranger or a friend online, tell an adult you trust immediately. It is never a good idea to respond. Responding is only likely to make things worse, and might result in you saying something you wish you hadn't.
  • Take a breather to avoid "flaming." File this one under "nothing's temporary online": If you get the urge to fire off an angry IM or comment on a message board or blog, it's a good idea to wait a few minutes, calm down, and remember that the comments may stay up (with your screen name right there) long after you've regained your temper and maybe changed your mind.
  • Learn about copyrights. It's a good idea to learn about copyright laws and make sure you don't post, share, or distribute copyrighted images, songs, or files. Sure, you want to share them, but you don't want to accidentally do anything illegal that can come back to haunt you later.
  • Check yourself. Chances are, you've already checked your "digital footprint" — nearly half of all online users do. Try typing your screen name or email address into a search engine and see what comes up. That's one way to get a sense of what others see as your online identity.
  • Take it offline. In general, if you have questions about the trail you're leaving online, don't be afraid to ask a trusted adult. Sure, you might know more about the online world than a lot of adults do, but they have life experience that can help.
  •  
    Advice for teens from www.kidshealth.org. Here are some things to consider to safeguard your online identity and reputation:
    1. Remember that nothing is temporary online
    2. Mark your profile as private.
    3. Safeguard your passwords and change them regularly.
    4. Don't post inappropriate or sexually provocative pictures or comments.
    5. Don't respond to inappropriate requests
    6. Take a breather to avoid "flaming."
    7. Learn about copyrights.
    8. Check your digital footprint.
    9. Take it offline.
Anne Bubnic

California Assembly Bill 86 - 0 views

  •  
    Existing law, the Interagency School Safety Demonstration Act of 1985, states that the intent of the Legislature in enacting its provisions is to encourage school districts, county offices of education, law enforcement agencies, and agencies serving youth to develop and implement interagency strategies, in-service training programs, and activities that will, among other things, reduce school crime and violence, including bullying. Existing law establishes the School/Law Enforcement Partnership and charges it with undertaking several efforts intended to reduce school crime, as specified,including bullying.

    This bill would specify that bullying, as used in these provisions,means one or more acts by a pupil or a group of pupils directed against another pupil that constitutes sexual harassment, hate violence, or severe or pervasive intentional harassment, threats, or intimidation that is disruptive, causes disorder, and invades the rights of others by creating an intimidating or hostile educational environment, and includes\nacts that are committed personally or by means of an electronic act, as defined.

    Existing law prohibits the suspension, or recommendation for expulsion, of a pupil from school unless the principal determines that the pupil has committed any of various specified acts, including, but not limited to, hazing, as defined. This bill, in addition, would give school officials grounds to suspend a pupil or recommend a pupil for expulsion for bullying, including, but not limited to, bullying by electronic act.

Vicki Davis

Search and Seizure of Cell Phones: Can You Hear Me Now? - 0 views

  • May school officials lawfully “search” the confiscated cell phone to look at stored text messages, photographs, videos, and logs of incoming and outgoing calls? Clearly, the circumstances of the search must satisfy the T.L.O. standard. Not as clear, however, is whether such a search violates federal or Michigan laws regarding stored electronic communications.
  • [A] search of a student by a teacher or other school officials will be ‘justified at its inception’ when there are reasonable grounds for suspecting that the search will turn up evidence that the student has violated or is violating either the law or the rules of the school. Such a search will be permissible in its scope when the measures adopted are reasonably related to the objectives of the search and not excessively intrusive in light of the age and sex of the student and the nature of the infraction.”
  • In Klump v Nazareth Area Sch Dist, 425 F Supp 2d 622 (ED Pa, 2006), a federal district court denied the school’s motion to dismiss a lawsuit filed by a student whose cell phone was searched.
  • ...5 more annotations...
  • compensatory and punitive damages for the alleged unconstitutional search, violation of the Pennsylvania Wiretapping and Electronic Surveillance Control Act, invasion of privacy, and defamation.
  • The court ruled that the student had stated a claim for the alleged violation of his right to be free from an unreasonable search.
  • here was no basis for them to search the text and voice mail messages stored on the phone.
  • unlawful access to the stored voice mail and text message communications.
  • (2) A person shall not willfully and maliciously read or copy any message from any telegraph, telephone line, wire, cable, computer network, computer program, or computer system, or telephone or other electronic medium of communication that the person accessed without authorization. (3) A person shall not willfully and maliciously make unauthorized use of any electronic medium of communication, including the internet or a computer, computer program, computer system, or computer network, or telephone.
  •  
    Legal Implications for Searching Student Cell Phones. Although this article is written against Michigan law, it does help clarify some of the concepts for what is permissable. Note that searching a student's cell phone or wireless device without parent permission may violate state wiretapping laws.
  •  
    Confiscating and looking at information on cell phones by school officials is still not clear. This is a very interesting case study for those working with digital citizenship issues at their school.
  •  
    Fascinating article explaining Michigan take on searching and confiscating cell phones.
Anne Bubnic

Eight Tips for Monitoring and Protecting Your Online Reputation - 9 views

  •  
    Here are 8 tips to monitor and protect one's online reputation from the U.S. Government Information Security Blog: Search your name. Type your first and last name within quotation marks into several popular search engines to see where you are mentioned and in what context. Narrow your search and use keywords that apply only to you, such as your city, employer and industry association. Expand your search. Use similar techniques to search for your telephone numbers, home address, e-mail addresses, and personal website domain names. You should also search for your social security and credit card numbers to make sure they don't appear anywhere online. Read blogs. If any of your friends or coworkers have blogs or personal web pages on social networking sites, check them out to see if they are writing about or posting pictures of you. Sign up for alerts. Use the Google alert feature that automatically notifies you of any new mention of your name or other personal information. Limit your personal information. Tweet/chat/discuss regarding business and the emerging trends in your industry, but limit posting information on your personal life, which could be a subject of major scrutiny by recruiters and hiring managers. Also, be sure you know how organizations will use your information before you give it to them. Use privacy settings. Most social networking and photo-sharing sites allow you to determine who can access and respond to your content. If you're using a site that doesn't offer privacy settings, find another site. Choose your photos and language thoughtfully. You need to ensure that information posted online is written professionally without use of swear words and catchy phrases. Also, be very selective in posting photographs, and use your judgment to ensure that these photographs are how you want the world to see you. Take action If you find information about yourself online that is embarrassing or untrue, cont
Anne Bubnic

1 in 5 teens 'sext' despite risks - 0 views

  •  
    A new survey on kids in cyberspace finds that one in five teens have "sexted" - sent or received sexually suggestive, nude or nearly nude photos through cellphone text messages or e-mail. Most teens who sexted sent the photos to girlfriends or boyfriends, but 11% sent them to strangers, according to the study made public today by the National Center for Missing & Exploited Children and Cox Communications. Of teens who sext, 80% are under 18, the survey found.
  •  
    A new survey on kids in cyberspace finds that one in five teens have "sexted" - sent or received sexually suggestive, nude or nearly nude photos through cellphone text messages or e-mail.Most teens who sexted sent the photos to girlfriends or boyfriends, but 11% sent them to strangers, according to the study made public today by the National Center for Missing & Exploited Children and Cox Communications. Of teens who sext, 80% are under 18, the survey found.
Anne Bubnic

Terror in the Classroom: What Can be Done?, Part 1 - 0 views

  • Nancy Willard, author of "An Educators Guide to Cyberbullying and Cyberthreats" breaks down cyberbullying into the following categories: Flaming. Online fights using electronic messages with angry or vulgar language. Harassment. Repeatedly sending nasty, mean, an insulting messages. Denigration. "Dissing" someone online. Sending or posting gossip or rumors about a person to damage his or her reputation or friendships. Impersonation. Pretending to be someone else and sending or posting material to get that person in trouble or damage their reputation. Outing. Sharing someone's secrets or embarrassing information or images online. Trickery. Tricking someone into revealing secrets or embarrassing information and then sharing it online. Exclusion. Intentionally and cruelly excluding someone. Cyberstalking. Repeated, intense harassment and denigration that includes threats or creates significant fear (Willard, 2006).
  •  
    What is Cyberbullying?About a third (31%) of all students ages 12-14 have been bullied online according to a study by Opinion Research Corporation (2006). This research paper will examine some of the reasons for "cyberbullying," and what may be done about it.
Anne Bubnic

SB 2426 Cyberbullying Law passes [Illinois] - 0 views

  •  
    Amends the Harassing and Obscene Communications Act. Creates the Cyberbullying Law. Provides that the offense of harassment through electronic communications also includes the use of electronic communication for making a harassing statement for the purpose of alarming, tormenting, or terrorizing a specific person on at least 2 separate occasions; or creating and maintaining an Internet website or webpage, which is accessible to one or more third parties for a period of at least 24 hours, and which contains harassing statements made for the purpose of alarming, tormenting, or terrorizing a specific person. Establishes penalties. Effective immediately. The new law takes effect January 1st and provides that the Internet safety curriculums in schools will begin with the 2009-2010 school year. The bill allows the age-appropriate unit of instruction to be incorporated into the current courses of study regularly taught in the districts' schools.
Dean Mantz

academyofdiscovery - Internet Safety - 8 views

  • I will never post any information more personal than my first name nor will I post pictures of myself. I will not plagiarize, instead I will expand on others' ideas and give credit where it is due. I will use language appropriate for school. I will not insult my fellow students or their writing. I will only post pieces that I am comfortable with everyone seeing; other pieces I will keep as drafts. I will not be afraid to express my ideas, while not overgeneralizing or making derogatory/inflammatory remarks; any posts or edits on controversial issues must either be submitted to Mr. Wilkoff prior to posting or be a part of a classroom project/question which addresses controversial issues. I will use constructive/productive/purposeful criticism, supporting any idea, comment, or critique I have with evidence. I will take all online content creation seriously, posting only things that are meaningful and taking my time when I write. I will try to spell everything correctly. I will not use my public writing (blog posts, comments, discussion topics, wiki edits) as a chat room, instead, I will save IM language for private conversations. I will not bully others in my blog posts or in my comments. I will never access another student's account in order to pose as them or look at their personal content, but I will advise them when they haven't logged out of their computer from my own account. I will be proactive in monitoring the comments that others leave on my blog, utilizing the comment blacklist if necessary. I will personalize my blog and keep my writing authentic, while taking responsibility for anything blogged in my name. I will not provoke other students in my blog posts or comments. I will use my online content as an extension of the classroom, and in doing so, I will leave anything that unsaid in the classroom unsaid online. I will only post photos which are school appropriate and either in the creative commons or correctly cited. I will not spam (including, but not limited to meaningless messages, mass messages, and repetitive messages) I will only post comments on posts that I have fully read, rather than just skimmed. I will respect the public nature of online information, and in doing so, I will respect the wishes of my fellow students for keeping their information (full name, compromising stories, etc.) private.
Anne Bubnic

Humiliation and gossip are weapons of the cyberbully - 0 views

  • ead teachers are being advised to draw up new rules on mobile phone use amid a growing number of cases of what is now known as “cyber-bullying”. In many secondary schools, over 90% of bullying cases are through text messages or internet chatrooms. It is hoped that the rules about mobile phone use will protect children from abusive texts, stop phones going off in class and prevent mobiles being taken into exam halls.
  • Although the majority of kids who are harassed online aren’t physically bothered in person, the cyber-bully still takes a heavy emotional toll on his or her victims. Kids who are targeted online are more likely to get a detention or be suspended, skip school and experience emotional distress, the medical journal reports. Teenagers who receive rude or nasty comments via text messages are six times more likely to say they feel unsafe at school.
  • The problem is that bullying is still perceived by many educators and parents as a problem that involves physical contact. Most enforcement efforts focus on bullying in school classrooms, corridors and toilets. But given that 80% of adolescents use mobile phones or computers, “social interactions have increasingly moved from personal contact at school to virtual contact in the chatroom,'’ write Kirk R. Williams and Nancy G. Guerra, co-authors of one of the journal reports. “Internet bullying has emerged as a new and growing form of social cruelty.'’
  • ...1 more annotation...
  • Cyber-bullying tactics include humiliation, destructive messages, gossip, slander and other “virtual taunts” communicated through e-mail, instant messaging, chatrooms and blogs. The problem, of course, is what to do about it. While most schools do not allow pupils to use their mobiles in the school building, an outright ban is deemed unworkable. Advances in technology are throwing up new problems for teachers to deal with. Children use their phones to listen to music, tell the time or as a calculator. Cyber-bullies sometimes disclose victims' personal data on websites or forums, or may even attempt to assume the identity of their victim for the purpose of publishing material in their name that defames them or exposes them to ridicule.
  •  
    As more and more people have access to computers and mobile phones, a new risk to youngsters has begun to emerge. Electronic aggression, in the form of threatening text messages and the spread of online rumours on social networking sites, is a growing concern.
anonymous

Online Predators and Their Victims - 0 views

  • My (Liz B. Davis ) Summary of Key Points (All are quotes directly from the article): Online "Predators" and Their Victims. Myths, Realities, and Implications for Prevention and Treatment. by: Janis Wolak, David Finkelhor, and Kimberly J. Mitchell - University of New Hampshire and Michele L. Ybarra - Internet Solutions for Kids, Inc.
  • The publicity about online"predators" who prey on naive children using trickery and violence is largely inaccurate.
  • adult offenders who meet, develop relationships with, and openly seduce underage teenagers
  • ...21 more annotations...
  • In the great majority of cases, victims are aware they are conversing online with adults. In the N-JOV Study, only 5% of offenders pretended to be teens when they met potential victims online. (112)
  • Offenders rarely deceive victims about their sexual interests.
  • promises of love and romance
  • 99% of victims of Internet-initiated sex crimes in the N-JOV Study were 13 to 17 years old, and none were younger than 12. 48% were 13 or 14 years old. (115)
  • it was those 15-17 years of age who were most prone to take risks involving privacy and contact with unknown people. (115)
  • take place in isolation and secrecy, outside of oversight by peers, family  members, and others in the youth's face-to-face social networks (115)
  • Most of the online child molesters described in the N-JOV Study met their victims in chatrooms. In a 2006 study, about one third of youths who received online sexual solicitation had received them in chatrooms. (116)
  • Youth internet users with histories of offline sexual or physical abuse appear to be considerably more likely to receive online aggressive sexual solicitations. (117)
  • ..Although Internet safety advocates worry that posting personal information exposes youths to online molesters, we have not found empirical evidence that supports this concern. It is interactive behaviors, such as conversing online with unknown people about sex, that more clearly create risk. (117)
  • Online molesters do not appear to be stalking unsuspecting victims but rather continuing to seek youths who are susceptible to seduction. (117)
  • maintaining online blogs or journals, which are similar to social networking sites in that they often include considerable amounts of personal information and pictures, is not related to receiving aggressive sexual solicitation unless youths also interact online with unknown people. (117)
  • Boys constitute 25% of victims in Internet-initiated sex crimes, and virtually all of their offenders are male. (118
  • Some gay boys turn to the internet to find answers to questions about sexuality or meet potential romantic partners, and there they may encounter adults who exploit them. (118)
  • ..child molesters are, in reality, a diverse group that cannot be accurately characterized with one-dimensional labels. (118)
  • Online child molesters are generally not pedophiles. (118)Online child molesters are rarely violent. (119)
  • Child pornography production is also an aspect of Internet-initiated sex crimes. One in five online child molesters in the N-JOV Study took sexually suggestive or explicit photographs of victims or convinced victims to take such photographs of themselves or friends. (120)
  • Youths may be more willing to talk extensively and about more intimate matters with adults online than in face-to-face environments. (121
  • it may not be clear to many adolescents and adults that relationships between adults and underage adolescents are criminal. (122)
  • Simply urging parents and guardians to control, watch, or educate their children may not be effective in many situations. The adolescents who tend to be the victims of Internet-initiated sex crimes many not themselves be very receptive to the advice and supervision of parents. (122)
  • We recommend educating youths frankly about the dynamics of Internet-initiated and other nonforcible sex crimes. Youths need candid, direct discussions about seduction and how some adults deliberately evoke and then exploit the compelling feelings that sexual arousal can induce. (122)
    • anonymous
       
      Let's remember that although there are direct references to gay and male pedophiles of gay boys, that 99% of child sex offenders identify as heterosexual, online or offline.
  •  
    Cool summary of an article by Liz B. Davis -- Liz took the article and extracted the most valuable bits to her using google Docs. This methodology is fascinating, but even moreso the fact we may all begin doing this together with Diigo.
  •  
    This research article has the facts about sexual predatory behavior.
wasifali

Ironing Board for small space - 0 views

image

Ironing Board

started by wasifali on 18 Jun 23 no follow-up yet
wasifali

Ironing Board for small space - 0 views

image

Ironing Board

started by wasifali on 18 Jun 23 no follow-up yet
Anne Bubnic

Back to School Tips| Americans for Technology Leadership - 0 views

  • Cyberbullying Cyberbullying or online bullying is repeated, unwanted or cruel behavior against someone through computers, cell phones, gaming consoles, or other Internet-based means. The Internet is always “on,” opening the door for 24-hour harassment. Cyberbullies can be anonymous. They never have to confront their victims, they don’t have to be physically stronger and cyberbullies may be virtually invisible to parents and adults.
  • Look for warning signs your child may be the victim of cyberbullying – depression, lack of interest in school and friends, drop in grades and subtle comments that something may be wrong. If your child is the victim of cyberbullying, take action. By filtering email, instant messages and text messages, you can cut off many of the ways the cyberbullies contact your child. By having your child avoid the sites and groups where the attacks occur, he/she can ignore the bully. If harassment continues, change your child’s email address, user names and Internet account. If these steps do not stop the cyberbullying, contact the parents of the child who is behind the bullying, contact the school, and if the situation is not resolved, involve the police. It’s important to compile copies of harassing emails and postings to have evidence for authorities or the school, so they can take action. Look for signs that your child may be the cyberbully themselves – if they sign onto the Internet under someone else’s name, if they use someone else’s password without their permission, if they posted rude or mean things about someone else online, if they use bad language online, or if they changed their profile or away message designed to embarrass or frighten someone. Talk to your kids about cyberbullying and why it’s wrong and hurtful.
  •  
    As children go back to school, many parents are concerned about how their children will be using the computer and Internet devices in the classroom. Communication is key. Parents need to talk with their children about how to use the Internet safely, potential threats and appropriate usage of the Internet. By understanding both the benefits and the risks of Internet use, families can have a safer and more secure online experience. This article includes key tips on cyberbullying, internet safety, privacy and security.
Anne Bubnic

The Millennials Are Coming! - 0 views

  • Most agencies manage sensitive citizen data: addresses, Social Security numbers, financial records and medical information. You name it, some state or local office has it, and probably electronically. The problem? Many theorize that the Millennials' penchant for online openness could unintentionally expose private information, leaving it ripe for the picking. Millennials bring innovative ideas about technology's use, but for that same reason, do they also pose new security risks?
  • Anti-virus vendor Symantec released a study in March 2008 assessing this issue. Symantec commissioned Applied Research-West to execute the study, and 600 participants were surveyed from different verticals, including government. Survey participants included 200 IT decision-makers, 200 Millennial workers and 200 non-Millennial workers born before 1980. The data revealed that Millennials are more likely than workers of other ages to use Web 2.0 applications on company time and equipment. Some interesting figures include: 69 percent of surveyed Millennials will use whatever application, device or technology they want at work, regardless of office IT policies; and only 45 percent of Millennials stick to company-issued devices or software, compared to 70 percent of non-Millennials.
  • How might young people be workplace assets? Could all that time typing or texting make them speedy typists, able to whip up memos at the drop of a hat? Does familiarity with new and emerging technologies have its benefit? You bet, according to Dustin Lanier, director of the Texas Council on Competitive Government. The council brings state leaders together to shape policy for government departments, including IT. "I think they've built an approach to work that involves a lot of multitasking," Lanier said of the Millennials. "Something will be loading on one screen, you alt-tab to another application and pull up an e-mail, the first process loads, you flip back, start a new process, flip to a forum and pull up a topic. It's frenetic but normal to that group." Lanier doesn't think Millennials present more of an IT threat than their older co-workers. After all, young people don't have a monopoly on being distracted in the office. "I can't tell you how many times I've walked by people's desks of all ages and seen Minesweeper up," he said. He thinks employers should embrace some Web 2.0 applications. Otherwise, Millennials might be discouraged from sticking around. According to Lanier, this younger work force comprises many people who think of themselves as free agents. Government should accommodate some of their habits in order to prevent them from quitting.
  •  
    Get ready CIOs. They're coming. They have gadgets and doohickeys galore. They like their music downloadable and portable, and they grew up with the Internet, not before it. Their idea of community is socializing with people in other cities or countries through Facebook, MySpace or instant messages, and they use e-mail so often they probably think snail mail is an endangered species. They're the Millennials - those tech-savvy, 20-somethings and-under bound to warm up scores of office chairs left cold by retiring baby boomers. There's a good chance many will come to a government workplace near you, but their digital literacy could prove worrisome for security-conscious bosses.
Anne Bubnic

Ten Ways to Prevent Cyberbullying [HotChalk] - 0 views

  •  
    Cyberbullying is the practice of posting or sending harmful images or text via the Internet or other digital communication tools, such as cell phones, email, instant messaging, chat rooms, video game spaces or social networking environments such as My Space and Facebook. Following are some tips for parents and educators to help keep kids safe.
Anne Bubnic

Six Forms of Cyberbullying - 0 views

  •  
    From a study of Tech Abuse in Teen Relationships [Jan 07]:
    Six Forms of Cyberbullying
    1.Threats and Intimidation
    2.Harrassment or Stalking
    3.Vilification/Defamation
    4.Ostracising/Peer-Rejecton/Exclusion
    5.Publicly posting, sending or forwarding personal or private information or images
    6.Manipulation
Anne Bubnic

California School Cyberbullying Law Takes Effect Jan. 1 - 0 views

  •  
    A new law aimed at deterring the proliferation of cyberbullying at public schools goes into effect Jan. 1, bolstering educators' ability to tackle the problem head-on.The law gives school administrators the leverage to suspend or expel students for bullying other students by means of an electronic device such as a mobile phone or on an Internet social networking site like MySpace or Facebook; the law, however, only applies to bullying that occurs during school hours or during a school-related activity.
Anne Bubnic

Five Ideas for Making a Purposeful and Professional Digital Footprint - 0 views

  •  
    Five ideas to enable educators to develop and model a purposeful and professional digital footprint.\n\n1-Model responsible footprinting with your own practices in blogging, commenting, social networking, and picture posting.\n2-If you have established a professional blog, share it widely and proudly such as placing it in your email signature (if your employer will let you) and as Jeff Utecht suggests include your blog url when you comment on others blogs and in other forums. This enables others to see best practices and is a great way to get the conversation started.\n3-Google yourself (aka ego surfing). If you have something posted online that you'd be uncomfortable having a current or future student, parent, colleague, or employer find, delete it (if you can) or request that it be deleted. There are ways an aggressive internet detective can still find this information, but most won't go through the trouble and the mere fact that you deleted it shows some level of responsibility.\n4-If you do have online personal information and/or interests you wouldn't want discovered, use an unidentifiable screen name/avatar. This means you may need to update your screen name/avatar in your existing online presence.\n5-Engage in the conversation and professionally comment, reply, and present online, onsite, and at conferences.
scrollmantra

Digital Marketing Agency in Karol Bagh, Delhi - 0 views

  •  
    So no denying it, the world is shifting to the digital space, consuming all kind of information through digital means; mobile phones, laptops or desktops. While there are the ones who've grown up with smartphones and internet are very well embracing the new brave world of versatility and speed. Before we totally grab on the benefits of Digital Marketing for our business growth, you can't ignore the fact that Public Relations is equally important for any business or organisation effectiveness. The mix of traditional PR with content marketing on different social media platforms and search has led to different fold of opportunities for business growth. INTERGRATING DIGITAL MARKETING WITH PR Communication marketing agencies are all around the world willing to work for you but an effective integration can only happen if some of the key points are kept in mind: Clarity on business objective Comprehend the impact and process of the business before initiating campaigns WHY DIGITAL MARKETING We all are acknowledged to the fact that Digital marketing of a business or product can easily transmit for the scanty fraction value/cost of the print or TV ad. Also, the reach can be easily tracked and monitored as nowadays companies rely on reviews and feedback more than any celebrity endorsement. Hence, for every business, it's an effective way for a brilliant brand growth.
1 - 20 of 606 Next › Last »
Showing 20 items per page